Description
Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache or conduct certain attacks via headers that do not follow the HTTP specification, including (1) multiple Content-Length headers, (2) carriage return (CR) characters that are not part of a CRLF pair, and (3) header names containing whitespace characters.
Product(s):
- Squid 2.5.6
- Squid 2.5.stable1
- Squid 2.5.stable2
- Squid 2.5.stable3
- Squid 2.5.stable4
- Squid 2.5.stable5
- Squid 2.5.stable6
- Squid 2.5.stable7
- Squid 2.5_.stable1
- Squid 2.5_.stable3
- Squid 2.5_.stable4
- Squid 2.5_.stable5
- Squid 2.5_.stable6
- Squid 2.5 Stable3
- Squid 2.5 Stable4
- Squid 2.5 Stable9
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-0174, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-0174 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.